Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
In this paper a novel handoff decision algorithm for the mobile subsystem of tactical communications systems is introduced. In this algorithm, handoff decision metrics are: receiv...
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
Most comparisons of wireless ad hoc routing algorithms involve simulated or indoor trial runs, or outdoor runs with only a small number of nodes, potentially leading to an incorre...
Robert S. Gray, David Kotz, Calvin C. Newport, Nik...
Motion planning for mobile agents, such as robots, acting in the physical world is a challenging task, which traditionally concerns safe obstacle avoidance. We are interested in p...